17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

152<br />

Solutions<br />

portun<strong>it</strong>y exists at <strong>the</strong> technical layer, mainstream users balk—<strong>the</strong>y are eager <strong>to</strong><br />

have someone else solve <strong>the</strong> underlying problem, which <strong>the</strong>y perceive as technical<br />

ra<strong>the</strong>r than social.<br />

The second difference is that many content-layer enterprises have developed<br />

technical <strong>to</strong>ols <strong>to</strong> support collective participation, augmenting an individualistic<br />

ethos w<strong>it</strong>h commun<strong>it</strong>y mechanisms. 5 In <strong>the</strong> <strong>Internet</strong> and PC secur<strong>it</strong>y space,<br />

on <strong>the</strong> o<strong>the</strong>r hand, <strong>the</strong>re have been few <strong>to</strong>ols available <strong>to</strong> tap <strong>the</strong> power <strong>of</strong><br />

groups <strong>to</strong>, say, distinguish good code from bad. Instead, dealing w<strong>it</strong>h bad code<br />

has been left ei<strong>the</strong>r <strong>to</strong> individual users who are ill-pos<strong>it</strong>ioned <strong>to</strong>, say, decipher<br />

whe<strong>the</strong>r a Web s<strong>it</strong>e’s dig<strong>it</strong>al certificate is properly signed and validated, or <strong>to</strong><br />

<strong>Internet</strong> secur<strong>it</strong>y firms that try <strong>to</strong> sort out good code from bad according <strong>to</strong> a<br />

one-size-f<strong>it</strong>s-all standard. Such a defense still cannot easily sift bad gray-zone<br />

s<strong>of</strong>tware that is not a virus but still causes user regret—spyware, for instance—<br />

from unusual but beneficial code. As w<strong>it</strong>h <strong>the</strong> most direct forms <strong>of</strong> regulation,<br />

this solution is both under- and overinclusive.<br />

These two differences point <strong>to</strong> two approaches that might save <strong>the</strong> generative<br />

spir<strong>it</strong> <strong>of</strong> <strong>the</strong> Net, or at least keep <strong>it</strong> alive for ano<strong>the</strong>r interval. The first is <strong>to</strong><br />

reconfigure and streng<strong>the</strong>n <strong>the</strong> Net’s experimentalist arch<strong>it</strong>ecture <strong>to</strong> make <strong>it</strong> f<strong>it</strong><br />

better w<strong>it</strong>h <strong>it</strong>s now-mainstream home. The second is <strong>to</strong> create and demonstrate<br />

<strong>the</strong> <strong>to</strong>ols and practices by which relevant people and inst<strong>it</strong>utions can help secure<br />

<strong>the</strong> Net <strong>the</strong>mselves instead <strong>of</strong> wa<strong>it</strong>ing for someone else <strong>to</strong> do <strong>it</strong>.<br />

Bef<strong>it</strong>ting <strong>the</strong> conception <strong>of</strong> generative systems as works in progress that<br />

muddle through on <strong>the</strong> procrastination principle, <strong>the</strong> concrete ideas spawned<br />

by <strong>the</strong>se solutions are a b<strong>it</strong> <strong>of</strong> a grab bag. They are evocative suggestions that<br />

s<strong>how</strong> <strong>the</strong> kinds <strong>of</strong> processes that can work ra<strong>the</strong>r than a simple, elegant patch.<br />

Silver bullets belong <strong>to</strong> <strong>the</strong> realm <strong>of</strong> <strong>the</strong> appliance. Yet as w<strong>it</strong>h many <strong>of</strong> <strong>the</strong> <strong>Internet</strong>’s<br />

advances, some <strong>of</strong> <strong>the</strong>se hodge-podge solutions can be developed and<br />

deployed <strong>to</strong> make a difference w<strong>it</strong>hout major investment—and w<strong>it</strong>h luck, <strong>the</strong>y<br />

will be. The most significant barriers <strong>to</strong> adoption are, first, a wide failure <strong>to</strong> realize<br />

<strong>the</strong> extent <strong>of</strong> <strong>the</strong> problem and <strong>the</strong> costs <strong>of</strong> inaction; second, a collective action<br />

problem, exacerbated by <strong>the</strong> <strong>Internet</strong>’s modular design, thanks <strong>to</strong> which<br />

no single existing group <strong>of</strong> ac<strong>to</strong>rs who appreciates <strong>the</strong> problem sees <strong>it</strong> as <strong>it</strong>s own<br />

responsibil<strong>it</strong>y; and third, a <strong>to</strong>o-easily cultivated sense among <strong>Internet</strong> users that<br />

<strong>the</strong> system is supposed <strong>to</strong> work like any o<strong>the</strong>r consumer device.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!